Random Flashcards
(49 cards)
A web architect would like to move a company’s website presence to the cloud. One of the management team’s key concerns is resiliency in case a cloud provider’s data center or network connection goes down. Which of the following should the web architect consider to address this concern?
A. Containers
B. Virtual Private Cloud
C. Segmentation
D. Availability Zone
Availability Zone
Availability zones are the most appropriate cloud feature to address the concern of resiliency in case a cloud provider’s data center or network connection goes down.
Which of the following describes where an attacker can purchase DDoS or ransomware services?
A. Threat Intelligence
B. Open Source Intelligence
C. Vulnerability Database
D. Dark Web
Dark Web
A security administrator is managing administrative access to sensitive systems with the following requirements:
- Common login accounts must not be used for administrative duties.
- Administrative accounts must be temporal in nature.
- Each administrative account must be assigned to one specific user.
- Accounts must have complex passwords.
” Audit trails and logging must be enabled on all systems.
A. ABAC
B. SAML
C. PAM
D. CASB
PAM
PAM is a solution that enables organizations to securely manage users’ accounts and access to sensitive systems. It allows administrators to create unique and complex passwords for each user, as well as assign each account to a single user for administrative duties.
Company XYZ has been implementing Microsoft Office Communications Server 2007 R2 servers, unified communications clients, and unified communications applications.
They are now conducting the transition from solution to support. This project phase is referred to as?
A. Release
B. Operation
C. Retirement
D. Deployment
Operation
Technology Solutions Center is a reputable high achieving software development company. The company attributes her success in following strict SDLC.
After successfully carrying out requirement gathering and analysis and design, what other phases should follow in order?
A. Coding and Implementation, Testing, Deployment, Maintenance
B. Staging, Development, Test and Production environments
C. Test, Development, Staging and Production environments
D. Deployment, Coding and Implementation, Testing, Production environments
Coding and Implementation, Testing, Deployment, Maintenance
Disaster recovery testing involves simulating an IT failure or any other type of business disruption to assess a DR plan. The following are methods of testing a DRP except?
A. Checklist Testing
B. Parallel Testing
C. Simulation Testing
D. Emulation Testing
Emulation Testing
An MX record in DNS can help mitigate what type of Malware?
A. Rootkit
B. Bot
C. Phishing and Spear Phishing
D. Adware
Phishing and Spear Phishing
Organizations has robust incidence response strategy. The following are steps one would normally take after a cybersecurity incident has occurred.
In what order would you apply them?
A. Identification, Triage and analysis, Containment, Post-incident activity
B. Identification, Containment, Triage and analysis, Post-incident activity
C. Triage and analysis, Identification, Containment, Post-incident activity
D. Identification, Containment, Post-incident activity, Triage and analysis
Identification, Triage and analysis, Containment, Post-incident activity
Diffrence between Hypervisor I and Hypervisor II
A)Hypervisor I(Bare Metal) easy to manage and is flexible/ Hypervisor II(Application) offers more security.
B)Hypervisor II(Applications)easy to manage and is flexible/ Hypervisor I(Bare Metal) offers more security
B)Hypervisor II(Applications)easy to manage and is flexible/ Hypervisor I(Bare Metal) offers more security
Which of the following attacks would be rendered ineffective by the use of Salting?
A. Hash
B. Brute Force
C. Dictionary Attack
D.Rainbow Table
Rainbow Tables
What type of malware is adware typically classified as?
A. DOG
B. Backdoor
C. PUP
D. Rootkit
B. Backdoor
Nancy is concerned that there is a software keylogger on the system she is investigating. What data may have been stolen?
A. All files on the system
B. All keyboard input
C. All files the user access while the
keylogger was active
D, Keyboard and other input from the user
keyboard and other input from the user
Which of the following would a security specialist be able to determine upon examination of a server’s certificate?
A. CA public key
B. Server private key
C. CSR
D. OID
D. OID
A security engineer is configuring a system that requires the X.509 certificate information to be pasted into a form field in Base64 encoded format to import it into the system. Which of the following certificate formats should the engineer use to obtain the information in the required format?
A. PFX
B. PEM
C. DER
D. CER
PEM
Answer which port is which?
FTP
Telnat
SMTP
SNMP
SCP
TFTP
21
23
25
161
22
69
Put theses is order
SWAP, RAM, Cache Hard Drive
Cache, RAM, SWAP, Hard Drive
Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Choose two.)
A. Rainbow table attacks greatly reduce compute cycles at attack time.
B. Rainbow tables must include precomputed hashes.
C. Rainbow table attacks do not require access to hashed passwords.
D. Rainbow table attacks must be performed on the network.
E. Rainbow table attacks bypass maximum failed login restrictions.
B. Rainbow tables must include precomputed hashes.
E. Rainbow table attacks bypass maximum failed login restrictions.
A security analyst wishes to increase the security of an FTP server. Currently, all traffic to the FTP server is unencrypted. Users connecting to the FTP server use a variety of modern FTP client software.
The security analyst wants to keep the same port and protocol, while also still allowing unencrypted connections. Which of the following would BEST accomplish these goals?
A. Require the SFTP protocol to connect to the file server.
B. Use implicit TLS on the FTP server.
C. Use explicit FTPS for connections.
D. Use SSH tunneling to encrypt the FTP traffic.
C. Use explicit FTPS for connections.
An organization has determined it can tolerate a maximum of three hours of downtime. Which of the following has been specified?
A. RTO
B. RPO
C. MTBF
D. MTTR
A. RTO
Users report the following message appears when browsing to the company’s secure site: This website cannot be trusted. Which of the following actions should a security analyst take to resolve these messages? (Choose two.)
A. Verify the certificate has not expired on the server.
B. Ensure the certificate has a .pfx extension on the server.
C. Update the root certificate into the client computer certificate store.
D. Install the updated private key on the web server.
E. Have users clear their browsing history and relaunch the session.
A. Verify the certificate has not expired on the server.
C. Update the root certificate into the client computer certificate store.
Which of the following can be provided to an AAA system for the identification phase?
A. Username
B. Permissions
C. One-time token
D. Private certificate
A. Username